English Polski
Akademia Morska w Szczecinie

DSpace Home

DSpace/Manakin Repository

Browsing by Keyword antispoofing:

  • Ochin, Evgeny; Dobryakova, Larisa; Lemieszewski, Łukasz (Scientific Journals of the Maritime University of Szczecin, Zeszyty Naukowe Akademii Morskiej w Szczecinie, 2012)
    Many civil GNSS (Global Navigation Satellite System) applications need secure, assured information for asset tracking, fleet management and the like. But there is also a growing demand for geosecurity location- -based services. Unfortunately, GNSS is vulnerable to malicious intrusion and spoofing. How can users be sure that the information they receive is authentic? Spoofing is the transmission of matched-GNSS-signal- -structure interference in an attempt to commandeer the tracking loops of a victim receiver and thereby manipulate the receiver’s timing or navigation solution. A spoofer can transmit its counterfeit signals from a stand-off distance of several hundred meters, or it can be co-located with its victim. Spoofing attacks can be classified as simple, intermediate, or sophisticated in terms of their effectiveness and subtlety. In an intermediate spoofing attack, a spoofer synchronizes its counterfeit signals with the authentic GNSS signals, so they are code-phase-aligned at the target receiver. In this paper, authors consider the antispoofing algorithms based on finding statistical anomalies in the basic parameters of the satellite signals. At the stage of learning, the system of antispoofing explores the statistical properties of signals and at the phase of spoofing detection, the system used thresholds characteristics of statistical anomalies. The excess of the threshold characteristics provides a basis for probabilistic decision on the presence of spoofing
  • Ochin, Evgeny (Scientific Journals Maritime University of Szczecin, Zeszyty Naukowe Akademia Morska w Szczecinie, )
    One of the main problems in modern navigation of both manned and unmanned transport systems is that of transport safety. Differential GNSS technology has been used to improve the accuracy of transport positioning, in which position is calculated relative to a fixed reference station with a known position XYZ. Unfortunately, GNSS is vulnerable to malicious intrusion. GNSS signals and/or correction signals from the reference station can be spoofed by false signals, and special receivers have been used to provide defenses against such attacks. But how can the roving receiver (i.e. the user) be sure that the information they receive is authentic? Spoofing is the transmission of a matched-GNSS-signal-structure and/or signals to a reference station in order to cause interference and attempt to commandeer the tracking loops of a victim receiver, thereby allowing manipulation of the receiver’s timing or navigation solution. A spoofer can transmit its counterfeit signals from a stand-off distance of several hundred meters, or it can be co-located with its victim. In this article we consider the principles of spoofing detection using Differential GNSS, in which a correction signal from the reference station is used for the detection of spoofing
  • Ochin, Evgeny (Scientific Journals Maritime University of Szczecin, Zeszyty Naukowe Akademia Morska w Szczecinie, )
    The need for accuracy, precision, and data registration in underwater positioning and navigation should be viewed as no less stringent than that which exists on the sea surface. In the same way in which GNSS (Global Navigation Satellite System) receivers rely on the signals from multiple satellites to calculate a precise position, undersea vehicles discern their location by ranging to the acoustic signals originating from several fixed underwater acoustic sources using the Time-of-Arrival algorithm (ToA) through the Ordinary Least Squares method (OLS). In this article, the scope has been limited to only considering underwater positioning systems in which the navigation receiver is acoustically passive. The receiver “listens” to the buoys, receives their messages and solves the problem of finding its own position based on the geographical coordinates of the buoys. Often, such systems are called GNSS-like Underwater Positioning Systems (GNSS-like UPS). It is important to note the distinction between general purpose GNSS-like UPS (mainly civil systems) and special purpose GNSS-like UPS (mainly military systems). In this article, only general purpose GNSS-like UPS systems have been considered. Depending on the scale of system’s service areas, GNSS-like UPS are divided into global, regional, zonal and local systems. Only local GNSS-like UPS systems have been considered in this article. The spoofing of acoustic GNSS-like UPS works as follows: the acoustic GNSS signal generator transmits a simulated signal of several satellites. If the level of the simulated signal exceeds the signal strength of the real satellites, the acoustic receiver of an underwater object will “capture” the fake signal and calculate a false position based on it. All receivers that fall into the spoofing zone will calculate the same coordinates, while the receivers located in different places will have a mismatch in the XYZ coordinates.
  • Dobryakova, Larisa; Lemieszewski, Łukasz; Ochin, Evgeny (Scientific Journals Maritime University of Szczecin, Zeszyty Naukowe Akademia Morska w Szczecinie, )
    Satellite navigation systems are commonly used to precisely determine the trajectory of transportation equipment. The widespread deployment of GNSS is pushing the current receiver technology to its limits due to the stringent demands for seamless, ubiquitous and secure/reliable positioning information. This fact is further aggravated by the advent of new applications where the miniaturized size, low power consumption and limited computational capabilities of user terminals pose serious risks to the implementation of even the most basic GNSS signal processing tasks. This paper has presented the advantage of Cloud-based GNSS Navigation, which facilitates the possibility of developing innovative applications where their particularities (e.g. massive processing of data, cooperation among users, security-related applications, etc.) make them suitable for implementation using Cloud-based infrastructure.

Search repository

Advanced Search

Browse

My Account

RSS Feeds